our companies use these, our kids use these, we use these devices that are not secure. and when you look at what's happened in estonia in 2007, the monument issue, look at what happened in latvia, lithuania, georgia, azerbaijan, kurdistan and ore countries that have been -- other countries that have been hit with cyber attacks. we've gone from exploiting networks for intellectual property to attacks. and these attacks have been disruptive in nature. and this is like the kids all screaming at once at supper time. it happened every night. and -- that was a joke, i'm sorry, i can go shore. [laughter] slower. no jokes, okay. [laughter] the kids screaming every night and you're trying to talk, have a conversation, you can't communicate. as soon as they're quiet, you can communicate. in a disruptive service attack is much like that. your pipes, the communications pipes are filled up with this spam or botnet e-mail, and there are different versions of this that either block the communications channel or use up the computer capability of your system. either way you can't commun